- I Wayan Manik Suhartanta
- Nyoman Putra Sastra Magister Teknik Elektro dan Komputer Universitas Udayana http://orcid.org/0000-0002-8641-1577
Advances in Internet technology has provided a new market for the growth of the service provider. New sites appear in large numbers every year. This gives a new problem for users of the service. Users are forced to memorize many username and password to access the service. Overcoming it is a new emerging technology, the technology called Single Sign On (SSO). SSO offers simple authentication process for users to access many services sites. But the level of confidence of users and service providers, in the use of SSO technology have not been investigated. In this research shows that the rate of utilizing the SSO technology of the top 500 sites on alexa.com by 31% (155 websites). And the level of utilization of the SSO more than one provider, by 41%. In studies it appears that the most used SSO services provider is google followed by facebook and twitter. (turnitin check 9%) Keyword— Single Sign On (SSO), Computer Security, Authentication
future? An introduction,” in IST-Africa Conference Proceedings, 2011,
2011, pp. 1–9.
 A. Nair, A. Madhu, and J. J. Kizhakkethottam, “Security issues of
single sign on web services,” in Soft-Computing and Networks Security
(ICSNS), 2015 International Conference on, 2015, pp. 1–4.
 F. A. Alsulaiman and A. E. Saddik, “A novel 3D graphical password
schema,” in Virtual Environments, Human-Computer Interfaces and
Measurement Systems, Proceedings of 2006 IEEE International
Conference on, 2006, pp. 125–128.
 S. R. Basavala, N. Kumar, and A. Agarrwal, “Authentication: An
overview, its types and integration with web and mobile applications,”
in Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE
International Conference on, 2012, pp. 398–401.
 A. Volchkov, “Revisiting single sign-on: a pragmatic approach in a
new context,” IT Prof., vol. 3, no. 1, pp. 39–45, 2001.
 R. Malutan and C. Grosan, “Web authentication methods using single
sign on method and virtual keyboard,” in Grid, Cloud & High
Performance Computing in Science (ROLCG), 2015 Conference, 2015,
 A. G. Revar and M. D. Bhavsar, “Securing user authentication using
single sign-on in Cloud Computing,” in Engineering (NUiCONE),
2011 Nirma University International Conference on, 2011, pp. 1–4.
 Y. Jian, “An Improved Scheme of Single Sign-on Protocol,” 2009, pp. 495–498.
- EndNote – EndNote format (Macintosh & Windows)
- ProCite – RIS format (Macintosh & Windows)
- Reference Manager – RIS format (Windows only)
This work is licensed under a Creative Commons Attribution 4.0 International License
Terakhir Di Perbaharui Pada